Late last week HRC released MILPER message 18-264 which announced applications for the Computer Network Operations Development Program (CNODP). For those of you not familiar with it, CNODP is the Army’s school for training future cyber tool developers.

The other day a friend of mine shared a link to a new academic paper that was just released by a couple of researchers at the University of Cambridge. The team, Alexander Vetterl and Richard Clayton, wanted to see if they could create a technique to identify publicly accessible honeypots without having to actually interact with them.

Whenever the Army creates a new Military Occupational Specialty (MOS), they have to fill it with bodies initially that aren’t actually the MOS. In late 2013 the Army graduated its first class of the new 25D Cyber Network Defender MOS. Shorty there after, the 25D, were placed into the unit COMSEC vaults to do a job that they were never designed to do.

A few months ago, I wrote a story about the uproar that occurred after it was Strava released a heat map that showed it’s users working out and in the process revealed the location of classified military installations. Today the DOD announced that it had updated it’s policy for the use of personal and military owned wearable GPS devices.

I was browsing the 255N Facebook group earlier and saw that someone had pasted this handy graphic that shows when you promotion boards (assuming they don’t change anything) will meet. I figured it would be a nice little resource to add to everyone’s kit bag so here you go.

The opinions expressed here are those solely of the author and are not the official (or unofficial) opinions of the US Army
Unless otherwise noted, all content contained on this site is copyright by Troy Ward 2014 - 2018 and protected by federal Copyright Law.
Troy Ward
TheSignalChief@gmail.com